From 6fe0e8a6a7db81352a75f9f9838762d3ce26d5fd Mon Sep 17 00:00:00 2001 From: Lukas Vrabec Date: Feb 02 2019 12:41:12 +0000 Subject: * Sat Feb 02 2019 Lukas Vrabec - 3.14.3-20 - Allow sensord_t domain to use nsswitch and execute shell - Allow opafm_t domain to execute lib_t files - Allow opafm_t domain to manage kdump_crash_t files and dirs - Allow virt domains to read/write cephfs filesystems - Allow virtual machine to write to fixed_disk_device_t - Update kdump_manage_crash() interface to allow also manage dirs by caller domain Resolves: rhbz#1491585 - Allow svnserve_t domain to create in /tmp svn_0 file labeled as krb5_host_rcache_t - Allow vhostmd_t read libvirt configuration files - Update dbus_role_template interface to allow userdomains to accept data from userdomain dbus domains - Add miscfiles_filetrans_named_content_letsencrypt() to optional_block - Allow unconfined domains to create letsencrypt directory in /var/lib labeled as cert_t - Allow staff_t user to systemctl iptables units. - Allow systemd to read selinux logind config - obj_perm_sets.spt: Add xdp_socket to socket_class_set. - Add xdp_socket security class and access vectors - Allow transition from init_t domain to user_t domain during ssh login with confined user user_u --- diff --git a/.gitignore b/.gitignore index a5a7d37..8a83fe3 100644 --- a/.gitignore +++ b/.gitignore @@ -334,3 +334,5 @@ serefpolicy* /selinux-policy-35f00c1.tar.gz /selinux-policy-5181cbd.tar.gz /selinux-policy-contrib-992defd.tar.gz +/selinux-policy-contrib-b4944ea.tar.gz +/selinux-policy-07bdaa4.tar.gz diff --git a/selinux-policy.spec b/selinux-policy.spec index ae414eb..e11dbd6 100644 --- a/selinux-policy.spec +++ b/selinux-policy.spec @@ -1,11 +1,11 @@ # github repo with selinux-policy base sources %global git0 https://github.com/fedora-selinux/selinux-policy -%global commit0 5181cbd448c7aea433aad45675befadda96002e2 +%global commit0 07bdaa4e38ad031370335669a7df22fc8836dea0 %global shortcommit0 %(c=%{commit0}; echo ${c:0:7}) # github repo with selinux-policy contrib sources %global git1 https://github.com/fedora-selinux/selinux-policy-contrib -%global commit1 992defd63683a26684dbbca3e4d1d652cd340f00 +%global commit1 b4944ea2d50d41863dec6ba41d1cc815395da494 %global shortcommit1 %(c=%{commit1}; echo ${c:0:7}) %define distro redhat @@ -29,7 +29,7 @@ Summary: SELinux policy configuration Name: selinux-policy Version: 3.14.3 -Release: 19%{?dist} +Release: 20%{?dist} License: GPLv2+ Source: %{git0}/archive/%{commit0}/%{name}-%{shortcommit0}.tar.gz Source29: %{git1}/archive/%{commit1}/%{name}-contrib-%{shortcommit1}.tar.gz @@ -706,6 +706,18 @@ exit 0 %endif %changelog +* Sat Feb 02 2019 Lukas Vrabec - 3.14.3-20 +- Allow sensord_t domain to use nsswitch and execute shell +- Allow opafm_t domain to execute lib_t files +- Allow opafm_t domain to manage kdump_crash_t files and dirs +- Allow virt domains to read/write cephfs filesystems +- Allow virtual machine to write to fixed_disk_device_t +- Update kdump_manage_crash() interface to allow also manage dirs by caller domain Resolves: rhbz#1491585 +- Allow svnserve_t domain to create in /tmp svn_0 file labeled as krb5_host_rcache_t +- Allow vhostmd_t read libvirt configuration files +- Update dbus_role_template interface to allow userdomains to accept data from userdomain dbus domains +- Add miscfiles_filetrans_named_content_letsencrypt() to optional_block - Allow unconfined domains to create letsencrypt directory in /var/lib labeled as cert_t - Allow staff_t user to systemctl iptables units. - Allow systemd to read selinux logind config - obj_perm_sets.spt: Add xdp_socket to socket_class_set. - Add xdp_socket security class and access vectors - Allow transition from init_t domain to user_t domain during ssh login with confined user user_u + * Tue Jan 29 2019 Lukas Vrabec - 3.14.3-19 - Add new xdp_socket class - Update dbus_role_template interface to allow userdomains to accept data from userdomain dbus domains diff --git a/sources b/sources index b22740b..ee82a56 100644 --- a/sources +++ b/sources @@ -1,3 +1,3 @@ -SHA512 (selinux-policy-5181cbd.tar.gz) = e9b3310fcd57e83789d9a052bf9b9ed3ba30298712c0eb20689d2a172ce6eff89f17eba11a7c7fb1b0eda3ef11ac76d7c6cd6b85c88618e973d4e114d8d56d1f -SHA512 (selinux-policy-contrib-992defd.tar.gz) = e5e487dc051183af132e5a009f4dfb1daee222106301ada9de952f43cee2eb4eba07bb2294229f15f176e5f59d267b5b132899ad838fe135355735c7a687a1f9 -SHA512 (container-selinux.tgz) = 75e68ef36831d5ad0ea02be30c8d82285ece4741961103fd01d74d7acb8f707030181cbe5d6d3b3c17242d298bd2662d3f0a603f2880d7abd8af8724b7a70f54 +SHA512 (selinux-policy-contrib-b4944ea.tar.gz) = bc11049c77dd13e96a94e12a70e219d076c33c46aa2ba093a970661985dc3810d2b7702997b65fd6eaeecdbacd22524be2f707f1a951c9c84b35328d83b3f0f6 +SHA512 (selinux-policy-07bdaa4.tar.gz) = ae462e33c51e445f69551a0a327dcd5b63a38824d96205a69cebed43e0bdb1b37644e2faec4d4dcc6fea09de07793ea240926e2e8d1467be3f3c829f7c825899 +SHA512 (container-selinux.tgz) = 942c04ccf72c164442d0f7db96457cb7d1b2d1871312552e9da42757b3f60d4853e3ec30fc178d0cec69e294ffced74dcd0ecfcda1c6511531d2f170a6d82073